Week 1 journal entry-

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

Workforce Framework for Cybersecurity (NICE Framework) | NICCS (cisa.gov)

When it comes to all the different careers offered through the NICE workforce I would say defensive cybersecurity and Cybercrime Investigation.  Defensive cybersecurity would be very interesting for me I would have the job to protect peoples information from cyber attacks. This job would be a lot of effort but I feel that it would all pay off for the safeties of others in cyberspace. But I would say that Cybercrime definitely has more interest of mine, with technology growing and getting more advance there will still be issues with users. A job within the cybercrime investigation branch of the NICE workforce, doing crime investigations on the internet would be something I would enjoy and be very interested in. I would not be too interested in communications security management, this job just doesn’t seem to interest me too much.

Week 2 journal entry-

Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity etc.,] relate to cybersecurity?

Empiricism: Cybersecurity involves data and practical experience to understand and address security threats.
Determinism: Cybersecurity events have specific cause and effect relationships that can be determined on past incidents or experiences within cyberspace.
Parsimony: In cybersecurity, simple and clear solutions are preferred to complex ones, making it easier for those to understand Objectivity: Cybersecurity requires an approach free from norms and bias

Ethical neutrality-  Studying cyber crime through a social science lens creates numerous opportunities for exploring ethical issues

Relativism- Relating newer program or past issues to things that are relative to the problem at hand

Skepticism-  It promotes rigorous testing, validation, and consideration of alternative explanations

Week 3

Researchers might use this information to figure out which groups are most likely to be attacked, seeing this data can help researchers can see why these groups are being attacked. This can also help researchers to see what the other industries who are attacked less have as their security. With this knowledge, those who make the security systems could upgrade the security or even properly prepare for a potential attack. For example, the military has much lower attacks compared to medical, researchers could try to see what the military does to protect their data and try to use it for the medical industry.

Week 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.

Give specific examples of how your digital experiences relate to each level of need.

Physiological needs- I would say the use of technology effects my physiological needs by helping preserve and give me things I need to survive, an example would be how my fridge keeps my food edible.

Safety needs- Security needs relate to technology in todays world by security measures taken online, like passkeys for passwords, to keep my online data safe.

Belongingness and love- A way that technology can relate to belongingness would be social media by feeling like I belong by being included in groups and talking to many different people.

Esteem needs- A way that esteem needs are met through technology for me would be through my app I use to track my weightlifting and diet.

Self actualization- A way to have self actualization would be fully completing my e-portfolio and getting a job in the cybersecurity field.

Week 5

Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each
motive the way you rank it.

1.Political- I would say that political is definitely the most sense. Political cyber attacks can effect a nation as a whole, an example would be the 2016 election.

2.For money- Money motivates a lot of people in life, and if people see a way to get money out of people online it becomes a bigger problem for the cyberspace.

3.Revenge- Getting revenge on someone online by attacking them through the web is a petty and evil thing to do.

4.Boredom- If someone is bored they should do something productive rather than attack people on the internet

5. Multiple reasons- Having many different reasons for these attacks online can create more issues online.

6.Entertainment- Entertainment seems to be more of a short term effect and not as serious as the others.

7.Recognition – I feel that most people would not want to be known for committing crimes because they might get caught easier.

Week 6

Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source].

Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent.

Though I am unable to find these fake websites there are ways to spot the difference between a real website and a fake one. First would be checking the websites domain to see if there are any grammar issues such as BankoffAmerica.com having an extra F to throw people off. Another example of spotting a fake website would be looking for a verification of some sort to show that the website is verified, if the website you are trying to access has a padlock near it you can trust that the website is secure. Lastly, you can check the websites contact information (if provided) and see if they respond to your call or email for verification, such as a bank email that you might be insecure about, you can contact your bank to check if this is a real website.

Hall, D. (2020). How to determine if a website is a fake, fraud or scam. Retrieved from https://blog.webnames.ca/how-to-determine-if-a-website-is-a-fake-fraud-or-scam/

Week 7

Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).

Meme #1- This man is smiling because he has a strong human firewall, meaning he is trained
properly to keep himself safe in cyberspace by knowing how to avoid cyber attacks and
offednerds.
Meme #2- The second meme shows a women next to a huge PC with her own laptop, in my
mind this women is hacking into the main frame. The bottom text “Human Errors” is used to
show that human errors are what cause most problems in cyberspace.
Meme #3- The last meme is a man sitting over a city looking like he is sad, I say he is sad
because human error is the most common error in cybersecurity.

Week 8

Watch this video and pay attention to the way that movies distort hackers.
Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTube

I feel that the media has somewhat altered peoples views and opinions on what cybersecurity really is. As pointed out in the video some examples of movies hacking are very unrealistic and are no where close to real hacking. However, there were examples that were more realistic such as the example of the hacker competition known as def con. Keren points out how many different aspects of this show use realistic features and terms that relate to cybersecurity. Overall I feel that the media depicts cyber security in a much more simple form than it is in reality, however there are some parts of media that depict it as its true complex form. 

Week 9

Social media and cybersecurityLinks to an external site.

Complete the Social Media Disorder scale Download Social Media Disorder scale.

How did you score?

What do you think about the items in the scale?

Why do you think that different patterns are found across the world?

I scored a 2/9 which indicate risky usage. Persistence and displacement were my two yes options on the scale, due to my attempt to cut back for a new years goal and being too distracted by social media to complete homework on an occasional basis. I thought some of the other items on the scale were interesting, such as arguing with parents over usage, conflict with family, and escape from problems. I feel that different patterns are found around the world because of different digital involvement around the world. In countries where many people are heavily involved in social media it is more common

Week 10

Read this and write a journal entry summarizing your response to the article on social cybersecurity

 https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/bLinks to an external site.

The article presented by the Army University press describes cyber security as a national security issue, focusing on how cyber threats can alter the public’s perception.This article goes over many different cyber security techniques used by the American army when it comes to cyber security talking about technology, psychology, and national defense. The main issue addressed in this was Russia’s use of misinformation and psychological attacks used to destabilize American society. The article talks about the ways the American Army’s response to Russia’s attacks. Examples used in this article consist of Network maneuver, information maneuver, and more emphasized BEND forms of maneuver. In conclusion, this article sumarizes the military’s techniques to deal with foreign cyber threats and the way they handle this situations. 

Week 11

Watch this videoLinks to an external site..  As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0

Throughout the video I see many different social themes presented, Mitigation and Effectiveness of Information Campaigns. As an IT specialist I feel that when it comes to mitigation you need to fully understand how a social cybersecurity attack be countered or mitigated. This is a key factor of your job and is key for the safety and well being of other peoples data that you would have to manage. With effectiveness of information campaigns it relates to helping the people with long term and short term issues for their security. Both of these social behaviors are important to think about in the IT field and helping people out.

Week 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf and describe how two different economics theories and two different psychological social sciences theories relate to the letter.

When it comes to the “SAMPLE DATA BREACH NOTIFICATION” paper you can relate the Marxian economic theory and the rational choice theory. I relate it to the Marxian economic theory because those who have power, the ability to hack into this websites systems, choose to steal from those with less power, the costumers who purchased from this website. I also can relate this paper to the rational choice theory, because the business decided to send this to all costumers who might have been affected by this in their best interest to help keep their reputation.  The two social science theories I would relate to this paper is parsimony and determinism. Parsimony because of how simple the letter is when addressing costumers who were effected by this. It also relates to determinism because this company was determined to keep their costumers happy by insuring that they know they are trying their best to retrive their data and keep it safe. 

Week 12 part 2

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.  The policies relate to economics in that they are based on cost/benefits principles.  Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

The article titled “Leveraging HackerOne data to develop an economic model of Bug Bounties” introduces a study on bug bounty programs, where independent security researchers are rewarded with payment for identifying and reporting vulnerabilities in company code. The researchers utilized data from HackerOne, a prominent platform that connects companies with certified security researchers, to help break down and analyze these programs to detect bugs and problems in the software. Through this process they were able to develop an economic model to understand the motivation and behaviors of participants in bug bounty. I relate this paper most to the Rational choice theory, because these business have these people come in for their benefit while benefiting those who participate with a job and economic growth.

Week 13

Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

would say the top five illegal activities on the Clario website are sharing passwords, addresses, or photos of others, Faking Your Identity Online, Collecting Information About People Younger Than 13, Using illegal , Bullying and Trolling.

Sharing passwords, addresses, or photos of others on the internet is a crime that I would dub the worst crime you can commit because selling and sharing others peoples data can lead to many bad things. Especially since this can lead to other people related to the users data stolen being obtained by the hacker as well. Faking your identity is also another crime that is dangerous, perpetrating someone on the internet can create false reputation and create problems for people who don’t deserve it. Collecting data on minors is also dangerous and threatens the safety of a child and their families. This also is extremely illegal to harass a minor and involve them in your computer. Searching illegal things such as bomb making or illegal contents involving minors is another serious crime that can committed online, this can lead to serious problems online.Bullying and trolling is less serious but still can heavily impact people online sometimes leading to suicide on those who face these crimes.